General | September 13, 2019Five worthy reads: Infrastructure as Code, the single source of truthFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore...
Endpoint Central | September 12, 2019The Joker's in town. Time to secure your Android devicesSecurity experts from Google have discovered a new spyware in 24 Play Store apps that, combined, have more...
Patch Connect Plus | September 12, 2019Patch Connect Plus goes one step further with new Application Management and Admin ToolsMicrosoft recently celebrated a significant milestone, as System Center Configuration Manager (SCCM) now...
Endpoint Central | September 11, 2019Microsoft Patch Tuesday September 2019: 79 vulnerabilities fixedNo matter how prepared you are, Patch Tuesday never fails to throw in a surprise. All supported versions of...
Log360 | September 11, 2019Announcing our weekly podcast series—subscribe now and start listeningHave you ever imagined listening to your favorite IT security expert discuss the ways you...
ADSelfService Plus | September 10, 2019Password sync in hybrid Active DirectoryOn any given day, employees toggle between multiple business-critical applications, both...
Log360 | September 9, 2019Combating threats with UEBA: Health is wealthIn this four-part series, Combating threats with UEBA, we explore hypothetical...
ADAudit Plus | September 6, 2019NTLM vulnerabilities that make you susceptible to relay attacksIn June 2019, Microsoft released patches for two critical vulnerabilities that were...
General | September 5, 2019Must-have features to recover quickly from accidental deletions in Active DirectoryAny IT admin that takes care of the IT infrastructure of a network will know how...
Mobile Device Manager Plus | September 3, 2019The what, why, and how of mobile application managementAccording to the recently released Verizon Mobile Security Index 2019, 69 percent of...